header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GSX Analyzer hardcoded superadmin credentials in Main.swf

After decompiling the SWF file 'Main.swf', a hardcoded credential in one of the products of GSX, namely GSX Analyzer, has been found. Credential is a superadmin account, which is not listed as a user in the userlist, but can be used to login GSX Analyzer portals. Seemingly a backdoor or a 'solution' to provide 'support' from the vendor. The found credentials are: Username: gsxlogin Password: gsxpassword A few sites externally on the internet are affected by this incident. Presumably all of the externally disclosed GSX analyzer portals have this vulnerability.

Clinic Management System Unauthenticated Blind SQL Injection (apointment.php age) Vulnerability

No authentication (login) is required to exploit this vulnerability. Blind SQL Injection Proof-Of-Concept (Using SQLMap) URL example: http://server/apointment.php Page: apointment.php Parameter: age (POST) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: ame=Test&age=24’ AND SLEEP(5) AND 'dQNv'='dQNv&sex=on&mobile=+972-50-7655443&email=test@gmail.com&date=07/12/2016&btext=Test

Beauty Parlour & SPA Saloon Management System Unauthenticated Blind SQL Injection (booking.php age) Vulnerability

No authentication (login) is required to exploit this vulnerability. Blind SQL Injection Proof-Of-Concept (Using SQLMap) URL example: http://server/booking.php Page: booking.php Parameter: age (POST) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: name=Test&age=2016' AND SLEEP(5) AND 'hhFr'='hhFr&sex=on&mobile=+972-50-7655443&email=test@gmail.com&date=07/12/2016&btext=Test

Heap Overflow when loading attacked JXR file in Adobe Flash

There is a heap overflow when loading the attacked JXR file in Adobe Flash. To reproduce, load the attached file using LoadImage.swf?img=12.atf. This issue can be a bit difficult to reproduce, as the crash occurs when the player is destroyed, so the crash screen doesn't always show up on the Player. The easiest way to detect the issue is to attach a debugger to the Player and refresh a few times. Took a closer look at this, it is a UaF of plane->model_hp_buffer in the open-source JXR component.

Ruby on Rails ActionPack Inline ERB Code Execution

This module exploits a remote code execution vulnerability in the inline request processor of the Ruby on Rails ActionPack component. This vulnerability allows an attacker to process ERB to the inline JSON processor, which is then rendered, permitting full RCE within the runtime, without logging an error condition.

IPS Community Suite <= 4.1.12.3 Autoloaded PHP Code Injection Vulnerability

The vulnerable code is located in the /applications/core/modules/front/system/content.php script. User input passed through the 'content_class' request parameter is not properly sanitized before being used in a call to the 'class_exists()' function at line 40. This could be exploited by unauthenticated attackers to inject and execute arbitrary PHP code leveraging the autoloading function defined into the /applications/cms/Application.php script. Successful exploitation of this vulnerability requires the application running on PHP before version 5.4.24 or 5.5.8.

Recent Exploits: